From my experience, a password is a tool used to secure my workday from a bad guy called “productivity”.
Because why use an SSH key when I can enter the same username and password I used to log into the workstation every time I need to do something through the VPN? (It keeps logging off every time the connection breaks.)
If there’s no ForceCommand (I think that’s what it was called?) in sshd.conf and no command=x in .authorized_keys (if any), you can probably use mosh. It spins up SSH to authenticate and then immediately start a UDP based connection afterwards. Instead of logging out every 15 minutes, you will get a “Last contacted X seconds ago” overlayed every minute, that’s sure an improvement. Do note, however, that it keeps your shell running with no way to reattach to it if your machine turns off.
From my experience, a password is a tool used to secure my workday from a bad guy called “productivity”.
Because why use an SSH key when I can enter the same username and password I used to log into the workstation every time I need to do something through the VPN? (It keeps logging off every time the connection breaks.)
If there’s no
ForceCommand(I think that’s what it was called?) in sshd.conf and nocommand=xin.authorized_keys(if any), you can probably usemosh. It spins up SSH to authenticate and then immediately start a UDP based connection afterwards. Instead of logging out every 15 minutes, you will get a “Last contacted X seconds ago” overlayed every minute, that’s sure an improvement. Do note, however, that it keeps your shell running with no way to reattach to it if your machine turns off.What if hacker steals the SSH key?
Then they might as well steal the password from my clipboard.
What if it steals the clipboard so you cant copy paste?